Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014 (2014), Article ID 293214, 8 pages
http://dx.doi.org/10.1155/2014/293214
Research Article

An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

1Institute of Computer Network & Information Security, Nanchang Institute of Technology, Nanchang 330099, China
2School of Information Engineering, Nanchang Institute of Technology, Nanchang 330099, China
3Department of Scientific Research, Nanchang Institute of Technology, Nanchang 330099, China
4Network and Education Technology Center, Jinan University, Guangzhou 510632, China
5Institute of Information Engineering, Chinese Academy of Sciences, National Engineering Laboratory for Information Security Technologies, Beijing 100093, China

Received 1 July 2014; Accepted 11 September 2014; Published 16 November 2014

Academic Editor: Yuxin Mao

Copyright © 2014 Wenfeng Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS). The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.